US10791111B2 - Multi-step authentication using objective and subjective credentials - Google Patents
Multi-step authentication using objective and subjective credentials Download PDFInfo
- Publication number
- US10791111B2 US10791111B2 US15/792,961 US201715792961A US10791111B2 US 10791111 B2 US10791111 B2 US 10791111B2 US 201715792961 A US201715792961 A US 201715792961A US 10791111 B2 US10791111 B2 US 10791111B2
- Authority
- US
- United States
- Prior art keywords
- user
- subjective
- challenge
- authentication system
- objective
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
- 230000006397 emotional response Effects 0.000 claims abstract description 11
- 238000000034 method Methods 0.000 claims description 79
- 230000004044 response Effects 0.000 claims description 51
- 238000003860 storage Methods 0.000 claims description 40
- 238000004590 computer program Methods 0.000 claims description 22
- 230000002996 emotional effect Effects 0.000 claims description 12
- 230000000875 corresponding effect Effects 0.000 claims description 8
- 230000002596 correlated effect Effects 0.000 claims description 5
- 230000002452 interceptive effect Effects 0.000 claims 2
- 230000036651 mood Effects 0.000 description 32
- 238000012512 characterization method Methods 0.000 description 28
- 230000006870 function Effects 0.000 description 25
- 238000012545 processing Methods 0.000 description 12
- 238000010586 diagram Methods 0.000 description 10
- 238000013500 data storage Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 7
- 230000007246 mechanism Effects 0.000 description 7
- 238000007726 management method Methods 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 230000008520 organization Effects 0.000 description 4
- 230000003068 static effect Effects 0.000 description 4
- 238000010200 validation analysis Methods 0.000 description 4
- 238000003491 array Methods 0.000 description 3
- 238000013473 artificial intelligence Methods 0.000 description 3
- 238000006243 chemical reaction Methods 0.000 description 3
- 230000006835 compression Effects 0.000 description 3
- 238000007906 compression Methods 0.000 description 3
- 230000010354 integration Effects 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 238000003058 natural language processing Methods 0.000 description 3
- 230000006855 networking Effects 0.000 description 3
- 230000000007 visual effect Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000001902 propagating effect Effects 0.000 description 2
- 230000002207 retinal effect Effects 0.000 description 2
- 230000035943 smell Effects 0.000 description 2
- 238000007619 statistical method Methods 0.000 description 2
- 238000012384 transportation and delivery Methods 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 208000027534 Emotional disease Diseases 0.000 description 1
- WMFYOYKPJLRMJI-UHFFFAOYSA-N Lercanidipine hydrochloride Chemical compound Cl.COC(=O)C1=C(C)NC(C)=C(C(=O)OC(C)(C)CN(C)CCC(C=2C=CC=CC=2)C=2C=CC=CC=2)C1C1=CC=CC([N+]([O-])=O)=C1 WMFYOYKPJLRMJI-UHFFFAOYSA-N 0.000 description 1
- 241000699670 Mus sp. Species 0.000 description 1
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009172 bursting Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000012517 data analytics Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000000994 depressogenic effect Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000008451 emotion Effects 0.000 description 1
- 230000000763 evoking effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000012417 linear regression Methods 0.000 description 1
- 238000007477 logistic regression Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 238000013439 planning Methods 0.000 description 1
- 229920001690 polydopamine Polymers 0.000 description 1
- 238000011176 pooling Methods 0.000 description 1
- 238000013468 resource allocation Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
Definitions
- the present invention relates to the authentication of software users who request access to a secured application or system and, in particular, to multi-step authentication procedures that require the validation of multiple sets of credentials.
- Two-step authentication methods are more difficult to circumvent.
- Such mechanisms after verifying that a user has entered a correct password, require the user to perform an additional authentication step.
- Such an additional step may, for example, comprise identifying a previously selected photograph, looking into or placing a finger on a biometric scanner, correctly typing an alphanumeric string displayed to the user in a distorted, non-textual graphical form, or choosing items that exhibit a certain semantic characteristic (such as by clicking displayed images that show automobiles).
- an authentication mechanism may comprise, mechanisms that verify only “objective” credentials, which must be verified by correctly entering a predetermined “correct” response, are inherently vulnerable. Therefore, although more secure than one-step password-based authentication, multi-step authentication mechanisms that require a user to authenticate only objective credentials may still be cracked. For example, a malicious party capable of stealing a stored password may also be able to access stored non-textual credentials and the correct user responses associated with the non-textual credentials. OCR or artificial-intelligence technology may be able to interactively identify an alphanumeric string displayed as a distorted graphic. And aware image-recognition technology may be capable of interring semantic characteristics of an image almost as accurately as a human user.
- One embodiment of the present invention is a user-authentication system that includes a processor, memory, and a hardware storage device that contains software to implement a method for multi-step authentication using objective and subjective credentials.
- a user sets up a log-in procedure by selecting an objective log-in credential, such as a password, and a subjective challenge, such as an audio recording or a video clip.
- the system then plays the subjective challenge and the user responds with a subjective description of the emotional state that the subjective challenge invokes in the user.
- the user may then attempt to log onto the system by submitting the objective credential and, when the system responds by playing either the original subjective challenge or a similar challenge, the user returns a second subjective description of how the challenge makes the user feel. If the system determines that the second description is consistent with the original subjective description, the user is granted access.
- a user sets up a log-in procedure by submitting to a user-authentication system an objective log-in credential, such as a password, and a subjective challenge, such as an audio recording or a video clip.
- the system then plays the subjective challenge and the user responds with a subjective description of the emotional state that the subjective challenge invokes in the user.
- the user may then attempt to log onto the system by submitting the objective credential and, when the system responds by playing either the original subjective challenge or a similar challenge, the user returns a second subjective description of how the challenge makes the user feel. If the system determines that the second description is consistent with the original subjective description, the user is granted access.
- Yet another embodiment of the present invention is a computer program product that includes software stored on a computer-readable storage medium capable of being run by a computerized user-authentication system to perform a method for multi-step authentication using objective and subjective credentials.
- a user sets up a log-in procedure by submitting to the user-authentication system an objective log-in credential, such as a password, and a subjective challenge, such as an audio recording or a video clip.
- the system plays the subjective challenge and the user responds with a subjective description of the emotional state that the subjective challenge invokes in the user.
- the user may then attempt to log onto the system by submitting the objective credential and, when the system responds by playing either the original subjective challenge or a similar challenge, the user returns a second subjective description of how the challenge makes the user feel. If the system determines that the second description is consistent with the original subjective description, the user is granted access.
- FIG. 1 shows a structure of a computer system and computer program code that may be used to implement a method for multi-step authentication using objective and subjective credentials in accordance with embodiments of the present invention.
- FIG. 2 is a flow chart that illustrates steps of a procedure for allowing a user to identify objective and subjective log-in credentials in accordance with embodiments of the present invention.
- FIG. 3 is a flow chart that illustrates steps of a procedure for correlating subjective log-in challenges with user sentiments in accordance with embodiments of the present invention.
- FIG. 4 is a flow chart that illustrates steps of a method for multi-step user authentication comprising both objective and subjective authentication steps in accordance with embodiments of the present invention.
- FIG. 5 depicts a cloud computing environment according to an embodiment of the present invention.
- FIG. 6 depicts abstraction model layers according to an embodiment of the present invention.
- Embodiments of the present invention recite a technical improvement upon known two-step authentication technology by requiring a user to enter credentials that are a function of the user's subjective response to a system challenge.
- a “subjective” challenge does not merely look up a stored “correct” response and attempt to match that correct response to user input.
- a subjective validation procedure asks a user to make a subjective judgment about a challenge and then determines whether the user's resulting response is consistent with that same user's previous subjective judgments.
- Such embodiments improve the security of known authentication technology because they do not rely solely upon entry of previously stored secret data.
- any security mechanism that relies upon maintaining the secrecy of an element of stored information regardless of the sophistication of an encryption algorithm or other method of preserving that secrecy, is inherently vulnerable. This is true whether that secret element is a password, an encryption key, a semantic meaning of an image, a numeric representation of a human fingerprint or retinal scan, a gestural pattern, or an alphanumeric string represented by a distorted graphic.
- the present invention's subjective validation procedure does not need to store a secret, but potentially discoverable, “correct” response to a subjective challenge. Instead, it employs an inferential method that determines a likelihood that a particular user's subjective response is consistent with that user's previous subjective responses. Because such inferences are performed interactively, and are based on behavior specific to a particular user rather than on a simple method of matching a user response to stored data, such embodiments do not suffer from vulnerabilities that arise from the need to maintain the secrecy of stored objective credentials.
- Embodiments and examples described in this document are limited for pedagogical purposes to methods of two-step authentication, in which a first step comprises objective authentication of objective credentials and a second step comprises subjective authentication of subjective credentials. These embodiments and examples should not be construed to limit embodiments of the present in invention to two authentications steps, nor to embodiments in which one or more objective authentication steps precede one or more subjective authentication steps.
- the present invention is flexible enough to accommodate authentication methods that comprise an arbitrary number of objective and subjective authentication procedures in any order.
- Embodiments may comprise subjective authentication steps that may require users to provide subjective responses to any class of content, such as non-musical sounds, animations, smells, generalized graphical images, charts, statistical analyses, new items, graphical layouts, spoken word, video content, smells, or tactile, force-feedback, or haptic content.
- the present invention may be a system, a method, and/or a computer program product at any possible technical detail level of integration
- the computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention
- the computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device.
- the computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing.
- a non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing.
- RAM random access memory
- ROM read-only memory
- EPROM or Flash memory erasable programmable read-only memory
- SRAM static random access memory
- CD-ROM compact disc read-only memory
- DVD digital versatile disk
- memory stick a floppy disk
- a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon
- a computer readable storage medium is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
- Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network.
- the network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers.
- a network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
- Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, configuration data for integrated circuitry, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++, or the like, and procedural programming languages, such as the “C” programming language or similar programming languages.
- the computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
- the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
- electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
- These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
- the computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
- each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s).
- the functions noted in the blocks may occur out of the order noted in the Figures.
- two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
- FIG. 1 shows a structure of a computer system and computer program code that may be used to implement a method for multi-step authentication using objective and subjective credentials in accordance with embodiments of the present invention.
- FIG. 1 refers to objects 101 - 115 .
- computer system 101 comprises a processor 103 coupled through one or more I/O Interfaces 109 to one or more hardware data storage devices 111 and one or more I/O devices 113 and 115 .
- Hardware data storage devices 111 may include, but are not limited to, magnetic tape drives, fixed or removable hard disks, optical discs, storage-equipped mobile devices, and solid-state random-access or read-only storage devices.
- I/O devices may comprise, but are not limited to: input devices 113 , such as keyboards, scanners, handheld telecommunications devices, touch-sensitive displays, tablets, biometric readers, joysticks, trackballs, or computer mice; and output devices 115 , which may comprise, but are not limited to printers, plotters, tablets, mobile telephones, displays, or sound-producing devices.
- Data storage devices 111 , input devices 113 , and output devices 115 may be located either locally or at remote sites from which they are connected to I/O Interface 109 through a network interface.
- Processor 103 may also be connected to one or more memory devices 105 , which may include, but are not limited to, Dynamic RAM (DRAM), Static RAM (SRAM), Programmable Read-Only Memory (PROM), Field-Programmable Gate Arrays (FPGA), Secure Digital memory cards, SIM cards, or other types of memory devices.
- DRAM Dynamic RAM
- SRAM Static RAM
- PROM Programmable Read-Only Memory
- FPGA Field-Programmable Gate Arrays
- SIM cards SIM cards, or other types of memory devices.
- At least one memory device 105 contains stored computer program code 107 , which is a computer program that comprises computer-executable instructions.
- the stored computer program code includes a program that implements a method for multi-step authentication using objective and subjective credentials in accordance with embodiments of the present invention, and may implement other embodiments described in this specification, including the methods illustrated in FIGS. 1-4 .
- the data storage devices 111 may store the computer program code 107 .
- Computer program code 107 stored in the storage devices 111 is configured to be executed by processor 103 via the memory devices 105 .
- Processor 103 executes the stored computer program code 107 .
- stored computer program code 107 may be stored on a static, nonremovable, read-only storage medium such as a Read-Only Memory (ROM) device 105 , or may be accessed by processor 103 directly from such a static, nonremovable, read-only medium 105 .
- stored computer program code 107 may be stored as computer-readable firmware 105 , or may be accessed by processor 103 directly from such firmware 105 , rather than from a more dynamic or removable hardware data-storage device 111 , such as a hard drive or optical disc.
- the present invention discloses a process for supporting computer infrastructure, integrating, hosting, maintaining, and deploying computer-readable code into the computer system 101 , wherein the code in combination with the computer system 101 is capable of performing a method for multi-step authentication using objective and subjective credentials.
- any of the components of the present invention could be created, integrated, hosted, maintained, deployed, managed, serviced, supported, etc. by a service provider who offers to facilitate a method for multi-step authentication using objective and subjective credentials.
- the present invention discloses a process for deploying or integrating computing infrastructure, comprising integrating computer-readable code into the computer system 101 , wherein the code in combination with the computer system 101 is capable of performing a method for multi-step authentication using objective and subjective credentials.
- One or more data storage units 111 may be used as a computer-readable hardware storage device having a computer-readable program embodied therein and/or having other data stored therein, wherein the computer-readable program comprises stored computer program code 107 .
- a computer program product (or, alternatively, an article of manufacture) of computer system 101 may comprise the computer-readable hardware storage device.
- program code 107 for a method for multi-step authentication using objective and subjective credentials may be deployed by manually loading the program code 107 directly into client, server, and proxy computers (not shown) by loading the program code 107 into a computer-readable storage medium (e.g., computer data storage device 111 ), program code 107 may also be automatically or semi-automatically deployed into computer system 101 by sending program code 107 to a central server (e.g., computer system 101 ) or to a group of central servers. Program code 107 may then be downloaded into client computers (not shown) that will execute program code 107 .
- a central server e.g., computer system 101
- Program code 107 may then be downloaded into client computers (not shown) that will execute program code 107 .
- program code 107 may be sent directly to the client computer via e-mail.
- Program code 107 may then either be detached to a directory on the client computer or loaded into a directory on the client computer by an e-mail option that selects a program that detaches program code 107 into the directory.
- Another alternative is to send program code 107 directly to a directory on the client computer hard drive. If proxy servers are configured, the process selects the proxy server code, determines on which computers to place the proxy servers' code, transmits the proxy server code, and then installs the proxy server code on the proxy computer. Program code 107 is then transmitted to the proxy server and stored on the proxy server.
- program code 107 for a method for multi-step authentication using objective and subjective credentials is integrated into a client, server and network environment by providing for program code 107 to coexist with software applications (not shown), operating systems (not shown) and network operating systems software (not shown) and then installing program code 107 on the clients and servers in the environment where program code 107 will function.
- the first step of the aforementioned integration of code included in program code 107 is to identify any software on the clients and servers, including the network operating system (not shown), where program code 107 will be deployed that are required by program code 107 or that work in conjunction with program code 107 .
- This identified software includes the network operating system, where the network operating system comprises software that enhances a basic operating system by adding networking features.
- the software applications and version numbers are identified and compared to a list of software applications and correct version numbers that have been tested to work with program code 107 . A software application that is missing or that does not match a correct version number is upgraded to the correct version.
- a program instruction that passes parameters from program code 107 to a software application is checked to ensure that the instruction's parameter list matches a parameter list required by the program code 107 .
- a parameter passed by the software application to program code 107 is checked to ensure that the parameter matches a parameter required by program code 107 .
- the client and server operating systems including the network operating systems, are identified and compared to a list of operating systems, version numbers, and network software programs that have been tested to work with program code 107 .
- An operating system, version number, or network software program that does not match an entry of the list of tested operating systems and version numbers is upgraded to the listed level on the client computers and upgraded to the listed level on the server computers.
- program code 107 After ensuring that the software, where program code 107 is to be deployed, is at a correct version level that has been tested to work with program code 107 , the integration is completed by installing program code 107 on the clients and servers.
- Embodiments of the present invention may be implemented as a method performed by a processor of a computer system, as a computer program product, as a computer system, or as a processor-performed process or service for supporting computer infrastructure.
- FIG. 2 is a flow chart that illustrates steps of a procedure for allowing a user to identify objective and subjective log-in credentials in accordance with embodiments of the present invention.
- FIG. 2 contains steps 200 - 206 .
- a software user begins setting up log-in credentials capable of providing the user access to a software system by submitting, in response to a request from a security component of the software system, objective authentication credentials.
- the user of the software system may be operating on a computer system, a client device of a client-server architecture, a smartphone, a tablet, a laptop, another type of portable device, an integrated special-purpose system like a standalone music-production workstation, a virtual infrastructure component, or any other physical or virtual device capable of setting up or performing a log-in procedure of a secured software system.
- functionality of the present invention may be implemented solely on a client or user device, may be implemented solely on a remote server or as a service of a cloud-computing platform, or may be split between local and remote components.
- Any type of objective authentication credentials may be entered in this step, such as a password, a passphrase, biometric input, a musical passage, or a gesture, such that an associated user log-in procedure requires matching the user's subsequently entered objective log-in credentials with stored information that represents the objective credentials entered in step 200 .
- credentials may be case sensitive. Entry made either during the subsequent log-in procedure or during step 200 may be performed by any means known in the art, such as through a typewriter-style keyboard, a touchscreen, a fingerprint reader, a MIDI controller, or a retinal scanner. In some embodiments, entry may be performed by selecting a textual or non-textual item, such as from a list displayed by the security component.
- step 202 the user sets up a subjective authentication step of the multi-step authentication procedure, where the additional step is based on responding to a subjective challenge in order to generate subjective authentication credentials.
- the system allows the user to select a subjective challenge.
- the system will present to the user either the subjective challenge selected in step 202 or a different subjective challenge that has been associated with the selected subjective challenge by means of the method of FIG. 3 .
- the system will then authenticate the user only if receiving a subjective response from the user that is consistent with the subjective response entered by the same user in step 204 .
- the response entered during the log-in procedure of FIG. 4 does not need to match objective information stored during step 202 that represents the subjective challenge.
- any sort of subjective challenge may be presented to the user or selected by the user in this step, so long as the subjective challenge is capable of eliciting subjective responses from the user.
- the system may present to the user, or allow the user to select, one or more previously recorded audio or MIDI musical passages, may allow the user to select or upload one or more displayed photographs, animations, or video clips, or may allow the user to select a subjective challenge by singing a melody or playing a musical passage on a MIDI controller.
- the subjective challenge may comprise objective content, such as musical recordings visual content, or text.
- the challenge may comprise a political cartoon, a company logo, a news headline, or an audio recording of human speech.
- Some embodiments may allow a user to enter a challenge of the user's own choosing.
- a user may be allowed to play a musical passage of the user's own choosing on a MIDI keyboard or other type of computerized musical-instrument controller, to upload or identify a video clip or still image of the user's choosing or to submit a clip or image by means of an attached camera, or to enter an audio recording of the user singing or speaking content of the user's own choosing through an attached microphone.
- the system may be able to infer objective characteristics of a user-generated subjective challenge, such as a semantic meaning of an image, in order to facilitate correlation steps of FIG. 3 .
- a user-generated subjective challenge such as a semantic meaning of an image
- the system may also help a user more accurately enter manually generated challenges with aids like a metronome “click” or scrolling karaoke-style song lyrics.
- step 204 the system allows the user to associate each of the subjective challenges entered or selected in step 202 with a subjective response that is specific to the user.
- the system will present to the user the subjective challenges selected or entered in step 202 (or different subjective challenged that may be correlated to the selected subjective challenges by means of the method of FIG. 3 ).
- the system will then request from the user a subjective response for each subjective challenge that is determined to be consistent with the corresponding subjective response previously entered by the same user in step 202 .
- subjective responses may be case sensitive.
- the system may in step 204 display a combination of one or more photographs, animations, or video clips to the user, selected either by the system or by the user, and solicit a response from the user that describes one or more of the user's perception of the emotional content of the displayed content, or that describes one or more of the user's emotional reactions of to the content.
- the system in step 204 may ask the user to enter or select one or more one-word or natural-language descriptions of the mood elicited in the user by the excerpt.
- the user might describe three moods (or select three moods from a list) that were experienced by the user when listening to the excerpt: “happy,” “excited,” and “physically energized.”
- the user might also specify a relative intensity of each mood.
- the system in step 204 might allow the user to enter or select four subjective, natural-language descriptions of moods or sentiments experienced by the user when viewing the photograph.
- one user might respond with the descriptions “peaceful,” “humbled by the vastness of nature,” “inspired,” and “nostalgic for country living,” while a second user might respond with “Worried about the Environment,” “I feel an affinity with wildlife,” “nostalgic,” and “sad.”
- Some embodiments might interpret such descriptions as case-sensitive text.
- Implementers may, subject to certain requirements, constrain a user's subjective responses in step 204 .
- the responses must allow the system to infer and correlate the user's subjective emotional response with objective characteristics of the subjective challenge.
- the system must also be capable of correlating the user's subjective responses with objective characteristics of the subjective challenge by means of the methods of FIGS. 3 and 4 . In some embodiments, this may use known methods of natural-language processing, text analytics, or semantic analytics to infer meaningful sentiment from the user's subjective responses.
- the subjective challenge may contain objective content, such as textual content and the aforementioned musical recordings and displayed visual content.
- challenges may comprise a political cartoon, a company logo, and a recording of human speech.
- steps 200 - 204 may be repeated in any combination.
- the user will have entered or selected at least one set of objective authentication credentials, such as a password, a photograph, or an audio recording, at least one subjective authentication challenge, such as an audio/video recording or a graphical image, and at least one subjective response to each of the subjective challenges, where each subjective response represents the user's subjective reaction to a corresponding subjective challenge.
- at least one set of objective authentication credentials such as a password, a photograph, or an audio recording
- at least one subjective authentication challenge such as an audio/video recording or a graphical image
- each subjective response represents the user's subjective reaction to a corresponding subjective challenge.
- the system associates the user's account with the objective d subjective challenges identified in steps 200 - 202 and with the subjective user responses identified in step 204 .
- These associations may be performed by any means known in the art, such as by storing the challenges and responses into tables of a relational database. Embodiments may be made more secure by encrypting this stored information, by storing it across multiple, distinct, storage repositories, by transferring the stored data between the system and the storage repositories through different channels (such as by transferring a password through an enterprise network connected to the system and by transferring a musical recording through a cellular network connected to a handheld device), or through any other means known in the art.
- FIG. 3 is a flow chart that illustrates steps of a procedure for correlating subjective log-in challenges with user sentiments inferred from subjective user responses entered during step 204 of FIG. 2 , FIG. 3 contains steps 300 - 306 .
- each stored challenge is associated with a set of parameters that each describe an objective characteristic of the challenge and with a set of subjective characterizations of the challenge aggregated from users' past subjective responses to the challenge.
- each candidate subjective challenge with one or more objective parameters.
- each stored recording may be associated with values a set of objective parameters.
- each recording may be associated with a distinct set of values of parameters that identify the recording's relative degree of dynamic-range compression, the recording's beats-per-minute (BPM) tempo, the recording's musical genre, or the name of a musical group, composer, or soloist associated with the recording.
- BPM beats-per-minute
- Embodiments of the present invention are flexible enough to accommodate many combinations of such parameters, but methods of FIG. 3 attempt to improve effectiveness of embodiments of the present invention by determining each parameter's relative degree of correlation with subjective user responses to each challenge, like the responses entered in step 204 .
- implementers may attempt to initially select a universe of parameters that may be more likely to have higher degrees of correlation. If, for example, a subjective challenge comprises a recording of a musical passage, an implementer might select a parameter that identifies the passage's musical genre or instrumentation, rather than identifying the passage's duration, title, or tonal center.
- a secondary parameter may be derived as a function of a subset of empirical parameters.
- a musical passage that may be characterized as comprising a chord progression may be associated with a secondary parameter that identifies subjective characteristics of certain chord progressions.
- Simple, consonant progressions such as a I-IV-V progression or a I-V-I progression might be arbitrarily associated with lower numeric values of this secondary parameter, progressions that stray farther from a tonal center, such as a I-III-iv-VI or a VI-ii-V progression, might be assigned higher values, more complex progressions comprising chords that contain many non-key notes (such as those used in modern jazz and pop music) would be assigned even higher values, and atonal progressions detached from any particular tonal center might be assigned the highest values.
- a secondary parameter might be interpreted as a measure of a musical passage's tonality.
- Objective parameters may be similarly associated with other types of content comprised by a subjective challenge.
- Photographic images for example, could be characterized by values of parameters that identify each image's resolution, color depth, average density, range of light, or average color saturation.
- a video clip might be associated with two sets of parameters that each either characterize the visual content of the clip or that characterize the audio content of the clip.
- Parametric values may be associated with each subjective challenge by any means known in the art. If, for example, a challenge is stored in or identified by a repository database record, other fields, records, or tables of the same, or a different, database may associate values with that challenge. In other cases, if subjective challenges are each stored in a folder of the repository as a multimedia file, each challenge's associated values may be stored as metadata of that challenge's corresponding file. For example, parametric values associated with an MP3-format audio file might be embedded into that file as ID3 fields.
- step 302 the system attempts to correlate subjective characterizations of the subjective challenges with each objective parameter identified in step 300 .
- This correlation may be performed by any means known in the art, including statistical analyses that identify which objective parameters are the most accurate predictors of certain user-submitted subjective descriptions.
- step 302 determines that a relatively large number of “peaceful” images are associated with a certain average color value and a relatively large proportion of “uneasy” images are associated with a different average color value. The system would thus determine that the average color-value parameter has a statistically significant degree of correlation with subjective user “mood” or “sentiment.” Moreover, if both “peaceful” and “uneasy” images are associated with similar distributions of values of an image-resolution parameter, the system would further determine that the average color-value parameter has a greater degree of correlation with subjective user sentiment than does the image-resolution parameter.
- Similar methods may be used to correlate parameters with user sentiment when an embodiment is capable of identifying a larger range of user moods.
- natural-language processing, analytics, artificial intelligence, or other known technologies may be used in step 204 or 206 of FIG. 2 in order to infer a user's mood or sentiment from natural-language descriptions entered by the user.
- an inferred user mood or sentiment may be associated with one or more of a predefined set of categories.
- objective parameters may be correlated with an ordered set user-submitted subjective responses. For example, a system may ask a user to enter three “moods” invoked in the user by a piece of recorded music, in decreasing order of importance. In this example, each recording of the set of all musical-recording challenges may be associated with values of parameters. The system may then in step 302 attempt to correlate each of the ten objective parameters with a set of triplets, where each triplet consists of the three moods entered by users in response to hearing one particular challenge recording.
- recordings made with higher levels of dynamic-range compression are more likely to be associated with triplets that identify the mood “aggressive” or those that specify the mood “aggressive” as a first (highest-priority) element of an ordered triplet, then the system would determine a higher degree of correlation between the dynamic-range compression parameter and a user's subjective mood.
- More sophisticated methods known in the art may be used to more precisely identify degrees of correlation, such as a multinomial logistic regression analysis or a linear regression analysis.
- the present invention is flexible enough to accommodate embodiments comprising any sort of correlation-identification mechanism desired by an implementer.
- step 304 the system selects a subset of the objective parameters that have been identified in step 302 as having a greatest degree of correlation with user-entered subjective characterizations of the stored subjective challenges.
- This selection may be made by any means preferred by an implementer. For example, the system may select a subset consisting of the ten parameters that have the greatest degree of correlation, or may select all parameters that correlate within a 70% confidence factor.
- the system will have associated each subjective challenge in the repository with values of those objective parameters that have a relatively high degree of correlation with user mood. If, for example, user-reported moods generated by musical recordings correlate most closely with the parameters “BPM,” “genre,” and “year of composition,” then those three parameters will be used to organize the set of stored musical recordings in step 306 . Recordings associated with more similar values of the three parameters will thus be determined to be more likely to invoke similar moods or sentiments in users.
- step 306 the system organizes the set of subjective challenges as a function of the most highly correlating parameters identified in step 304 . This organization will allow the system, during the method of FIG. 4 , to identify challenges that are most likely to evoke a mood similar to that evoked by a user's initial subjective challenge identified by that user in step 202 .
- selected parameters may be weighted such that those with the a higher degree of correlation are given greater weight when determining which objective parameters correlate most closely with user-described subjective characterizations.
- subjective challenges may be organized as a function of correlations between objective-parameter values and specific values of subjective user responses. For example, if two particular parameters correlate most closely with challenges that users describe in a positive way, but three other parameters correlate most closely with challenges that users described in negative terms, then challenges described most often as “vibrant” might be grouped as a function of the two particular parameters, and challenges described most often as “ominous” might be grouped as a function of the three other parameters.
- FIG. 4 is a flow chart that illustrates steps of a method for multi-step user authentication comprising both objective and subjective authentication steps in accordance with embodiments of the present invention.
- FIG. 4 contains steps 400 - 412 .
- step 400 the user notifies the secured software system that the user wishes to log onto the secured software system using the objective and subjective credentials previously set up by performing the method of FIG. 2 .
- step 402 the user responds to a system request for the objective credentials by entering the objective credentials previously identified by the same user in step 200 of FIG. 2 .
- objective credentials may be case sensitive.
- the system may in this step present other types of objective challenges, such as a request for a user to identify a photograph that had previously been selected by the user.
- step 402 If the user responds in step 402 by entering a correct set of objective credentials, the method of FIG. 4 proceeds to step 404 . If the user does not respond correctly, the system may again request the same objective credentials, may request a different set of objective credentials that are associated with the user, may offer the user a chance to recover or reset the requested credentials through an out-of-band channel, may bar the user from accessing the software system, may alert an administrator or other monitoring entity of a security breach, or may perform any other sort of response to a failed authentication request that is known in the art.
- step 404 if the user has correctly entered the requested objective credentials in step 402 , the system may begin a subjective-authentication phase of the multi-step authentication procedure by presenting to the user the one or more subjective challenges identified in step 202 of FIG. 2 .
- step 406 the user responds to the subjective challenge of step 404 by entering one or more subjective responses.
- the system responds to this entry by determining that the entered subjective responses may be interpreted as characterizing the user's mood or sentiment in a manner that is consistent with the user sentiment characterized by the user's previous responses to the subjective challenges in step 204 of FIG. 2 .
- the user in step 202 may have selected a certain musical recording as a subjective challenge and in step 204 entered two subjective characterizations of how the recording made the user feel: primarily “happy” and secondarily “vibrant.”
- the system would then play the same recording and ask the user to respond with two characterizations of how the recording made the user feel during this second playing.
- the system might require the user to respond with the same two subjective characterizations in the same order or might require characterizations to be entered with case-sensitivity. In other embodiments, the system might require the user to respond with the same two subjective characterizations in any order. In yet other embodiments, the system might use techniques of natural-language processing, text analytics, semantic analytics, sentiment analysis, or artificial intelligence to determine whether a first sentiment inferred from the user's first set of characterizations, entered in step 202 , are similar within a desired confidence level, to a second sentiment inferred from the user's second set of characterizations, entered in step 406 .
- a second set consisting of the ordered pair “joyous” and “excited” might be construed to imply a mood sufficiently consistent with the mood inferred from the first set.
- a second set consisting of the ordered pair “relaxed” and “peaceful but a little bored” might be construed to imply a mood that is inconsistent with the user's earlier mood, and thus result in the user being denied access to the secured system.
- the present invention is flexible enough to allow such embodiments to accommodate any known means desired by an implementer of determining such similarities, and to accommodate any known means desired by an implementer of setting such a confidence level, including arbitrary choices, choices made as a function of expert knowledge of the implementer, choices made as a function of business priorities or technical constraints, or choices made as a function of historic performance data.
- an optimal degree of similarity may be determined empirically, by testing an implementation with real-world users.
- Some embodiments may attempt to mitigate the potential indeterminateness of subjective authentication by allowing a user in step 404 or 406 to interactively reset subjective credentials previously established in steps 202 - 206 .
- the user may be allowed to do so only if the user is first able to correctly enter one or more objective authentication credentials, or if the user's two sets of entered subjective criteria match a less-stringent requirement for similarity.
- the system may select a secondary subjective challenge that is distinct from the first subjective challenge that was initially selected by the user in step 202 .
- the system may select this second challenge as a function of the organizing steps of the method of FIG. 3 .
- the intent of this step is to select a second element by means of parameters that have a relatively high degree of correlation with the user's subjective emotional response to the first challenge, as identified in step 304 of FIG. 3 .
- the system might in step 408 attempt to select a second image that is capable of eliciting the same or similar characterizations from the same user or that is capable of eliciting from the same user a set of subjective characterizations from which may be inferred a sentiment that is the same or similar to a user sentiment inferred from the characterizations entered in step 204 .
- this selection might be made by comparing values of certain parameters associated with each candidate image, where those certain parameters are determined in step 304 as having a high degree of correlation with the mood or sentiment experienced by a user in response to a subjective challenge. If, for example, the system had in step 304 determined that a subjective user characterizations of an image are highly correlated with image resolution, average density, and range of light, then the system might in step 408 select a challenge image for a particular user that has resolution, average density, and range of light similar to that of the image identified in step 202 as that same user's initial subjective challenge.
- moods and sentiments may be assigned numeric values, or tuplets of numeric values, based on an interpretation of each mood's relative strength in a particular dimension. For example, along an axis of positive/negative emotions, the mood “ecstatic” might be assigned a value of 1.0, “joyous” 0.8, “happy” 0.7, “satisfied” 0.5, “unhappy” 0.4, “miserable” 0.2, and “depressed” 0.1.
- Such numeric ranking may be used to quantitatively compare moods and sentiments, allowing a pair of moods and sentiments to be deemed “similar” or “dissimilar” as a function of the difference between the pair's numeric values along a single axis, or as a function of the distance between the pair's numeric tuplets in multidimensional space.
- the system might in this step proportionally weight the relative importance of each parameter when attempting to select a secondary subjective challenge in step 408 .
- step 410 the system presents to the user the secondary subjective challenge selected in step 408 , and requests the user to subjectively characterize the secondary subjective challenge or to subjectively describe a mood or sentiment invoked in the user by the secondary subjective challenge.
- subjective characterizations entered in this step may be interpreted as being case sensitive. This method of presenting the challenge, requesting a user response, and determining whether the response is consistent with the user's earlier subjective responses is similar to that of steps 404 - 406 .
- the system in this step authenticates the user in a manner analogous to that of step 406 , by determining whether the user's subjective characterizations of the second element of subjective content are consistent with the user's earlier subjective characterizations of the first element of subjective content selected in step 202 .
- This step is qualitatively different than known methods of determining whether an entered set of objective credentials match a stored copy of the same credentials. While known methods of objective authentication require a user to correctly match stored data items, embodiments of the present invention determine whether a user's subjective reactions to a new challenge are the type of reactions that would have been expected from the user that had previously entered subjective characterizations in step 204 . The user does not, in this subjective-authentication step, need to match any stored data.
- Embodiments of the present invention may use any of the previously described methods, or any other methods known in the art, to present the second subjective challenge to the user; to request a second set of one or more user characterizations of the second subjective challenge; to infer sentiment from the user's second set of one or more characterizations; to compare the user's first set of characterizations (submitted in step 204 ) to the second set of characterizations or to compare the mood or sentiment inferred from the first set of characterizations to the mood or sentiment inferred from the second set of characterizations; and to determine whether the two sets of characterizations or the sentiments are sufficiently “similar” to authenticate the user.
- step 412 the system determines whether the user's second set of characterizations entered in step 410 , are consist with the user's earlier characterizations entered in step 204 . If the system determines that the two are consistent, then the system deems the user to have been authenticated and grants the user access to the secured software system.
- Embodiments of the present invention may comprise a combination of more than one objective challenges, such as that of step 402 , and more than one subjective challenge, such as the challenges of steps 404 - 406 and 408 - 410 .
- the system may not present the user with the same subjective challenge that the user selected in step 202 , thus skipping steps 404 and 406 .
- the system may not challenge the user with subjective challenges distinct from the subjective challenge that the user selected in step 202 , thus omitting steps 408 - 410 .
- the present invention is flexible enough to accommodate any combination of one or more objective challenges with one or more subjective challenges, where the one or more subjective challenges may comprise a combination of a subjective challenge initially selected in step 202 and other subjective challenges chosen by the system step 408 as a function of the method of FIG. 3 .
- Embodiments may thus omit steps 404 - 406 or steps 408 - 410 , or may perform steps 408 - 410 multiple times, as desired by an implementer.
- Cloud computing is a model of service delivery for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services) that can be rapidly provisioned and released with minimal management effort or interaction with a provider of the service.
- This cloud model may include at least five characteristics, at least three service models, and at least four deployment models.
- Resource pooling the provider's computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to demand. There is a sense of location independence in that the consumer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter).
- Rapid elasticity capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time.
- Measured service cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, control led, and reported providing transparency for both the provider and consumer of the utilized service.
- level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts).
- PaaS Platform as a Service
- the consumer does not manage or control the underlying cloud infrastructure including networks, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations.
- Private cloud the cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on-premises or off-premises.
- Public cloud the cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
- Hybrid cloud the cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds).
- a cloud computing environment is service oriented with a focus on statelessness, low coupling, modularity, and semantic interoperability.
- An infrastructure comprising a network of interconnected nodes.
- cloud computing environment 50 comprises one or more cloud computing nodes 10 with which local computing devices used by cloud consumers, such as, for example, personal digital assistant (PDA) or cellular telephone 54 A, desktop computer 54 B, laptop computer 54 C, and/or automobile computer system 54 N may communicate.
- Nodes 10 may communicate with one another They may be grouped (not shown) physically or virtually, in one or more networks, such as Private, Community, Public, or Hybrid clouds as described hereinabove, or a combination thereof. This allows cloud computing environment 50 to offer infrastructure, platforms and/or software as services for which a cloud consumer does not need to maintain resources on a local computing device.
- computing devices 54 A-N shown in FIG. 5 are intended to be illustrative only and that computing nodes 10 and cloud computing environment 50 can communicate with any type of computerized device over any type of network and/or network addressable connection (e.g., using a web browser).
- FIG. 6 a set of functional abstraction layers provided by cloud computing environment 50 ( FIG. 5 ) is shown. It should be understood in advance that the components, layers, and functions shown in FIG. 6 are intended to be illustrative only and embodiments of the invention are not limited thereto. As depicted, the following layers and corresponding functions are provided:
- Hardware and software layer 60 includes hardware and software components.
- hardware components include: mainframes 61 ; RISC (Reduced Instruction Set Computer) architecture based servers 62 ; servers 63 ; blade servers 64 ; storage devices 65 ; and networks and networking components 66 .
- software components include network application server software 67 and database software 68 .
- Virtualization layer 70 provides an abstraction layer from which the following examples of virtual entities may be provided: virtual servers 71 ; virtual storage 72 ; virtual networks 73 , including virtual private networks; virtual applications and operating systems 74 ; and virtual clients 75 .
- management layer 80 may provide the functions described below.
- Resource provisioning 81 provides dynamic procurement of computing resources and other resources that are utilized to perform tasks within the cloud computing environment.
- Metering and Pricing 82 provide cost tracking as resources are utilized within the cloud computing environment, and billing or invoicing for consumption of these resources. In one example, these resources may comprise application software licenses.
- Security provides identity verification for cloud consumers and tasks, as well as protection for data and other resources.
- User portal 83 provides access to the cloud computing environment for consumers and system administrators.
- Service level management 84 provides cloud computing resource allocation and management such that required service levels are met.
- Service Level Agreement (SLA) planning and fulfillment 85 provide pre-arrangement for, and procurement of, cloud computing resources for which a future requirement is anticipated in accordance with an SLA.
- SLA Service Level Agreement
- Workloads layer 90 provides examples of functionality for which the cloud computing environment may be utilized. Examples of workloads and functions which may be provided from this layer include: mapping and navigation 91 ; software development and lifecycle management 92 ; virtual classroom education delivery 93 ; data analytics processing 94 ; transaction processing 95 ; and multi-step user authentication using objective and subjective credentials 96 .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Description
Claims (14)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/792,961 US10791111B2 (en) | 2017-10-25 | 2017-10-25 | Multi-step authentication using objective and subjective credentials |
| US15/844,897 US10798091B2 (en) | 2017-10-25 | 2017-12-18 | Multi-step authentication using objective and subjective credentials |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/792,961 US10791111B2 (en) | 2017-10-25 | 2017-10-25 | Multi-step authentication using objective and subjective credentials |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/844,897 Continuation US10798091B2 (en) | 2017-10-25 | 2017-12-18 | Multi-step authentication using objective and subjective credentials |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20190124067A1 US20190124067A1 (en) | 2019-04-25 |
| US10791111B2 true US10791111B2 (en) | 2020-09-29 |
Family
ID=66171309
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/792,961 Expired - Fee Related US10791111B2 (en) | 2017-10-25 | 2017-10-25 | Multi-step authentication using objective and subjective credentials |
| US15/844,897 Active 2038-04-05 US10798091B2 (en) | 2017-10-25 | 2017-12-18 | Multi-step authentication using objective and subjective credentials |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/844,897 Active 2038-04-05 US10798091B2 (en) | 2017-10-25 | 2017-12-18 | Multi-step authentication using objective and subjective credentials |
Country Status (1)
| Country | Link |
|---|---|
| US (2) | US10791111B2 (en) |
Families Citing this family (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11210674B2 (en) | 2010-11-29 | 2021-12-28 | Biocatch Ltd. | Method, device, and system of detecting mule accounts and accounts used for money laundering |
| US10949514B2 (en) | 2010-11-29 | 2021-03-16 | Biocatch Ltd. | Device, system, and method of differentiating among users based on detection of hardware components |
| US10970394B2 (en) * | 2017-11-21 | 2021-04-06 | Biocatch Ltd. | System, device, and method of detecting vishing attacks |
| US12101354B2 (en) * | 2010-11-29 | 2024-09-24 | Biocatch Ltd. | Device, system, and method of detecting vishing attacks |
| US20190158535A1 (en) * | 2017-11-21 | 2019-05-23 | Biocatch Ltd. | Device, System, and Method of Detecting Vishing Attacks |
| US10917431B2 (en) | 2010-11-29 | 2021-02-09 | Biocatch Ltd. | System, method, and device of authenticating a user based on selfie image or selfie video |
| US10834590B2 (en) | 2010-11-29 | 2020-11-10 | Biocatch Ltd. | Method, device, and system of differentiating between a cyber-attacker and a legitimate user |
| US10728761B2 (en) | 2010-11-29 | 2020-07-28 | Biocatch Ltd. | Method, device, and system of detecting a lie of a user who inputs data |
| US10069837B2 (en) | 2015-07-09 | 2018-09-04 | Biocatch Ltd. | Detection of proxy server |
| GB2539705B (en) | 2015-06-25 | 2017-10-25 | Aimbrain Solutions Ltd | Conditional behavioural biometrics |
| GB2552032B (en) | 2016-07-08 | 2019-05-22 | Aimbrain Solutions Ltd | Step-up authentication |
| US11606353B2 (en) | 2021-07-22 | 2023-03-14 | Biocatch Ltd. | System, device, and method of generating and utilizing one-time passwords |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7873995B2 (en) | 2003-09-29 | 2011-01-18 | Avaya Inc. | Method and apparatus for generating and reinforcing user passwords |
| US8099770B2 (en) | 2008-01-30 | 2012-01-17 | Hewlett-Packard Development Company, L.P. | Apparatus, and an associated methodology, for facilitating authentication using a digital music authentication token |
| US8914642B2 (en) | 2006-03-29 | 2014-12-16 | The Bank Of Tokyo-Mitsubishi Ufj, Ltd. | Person oneself authenticating system and person oneself authenticating method |
| US20150319153A1 (en) * | 2014-05-01 | 2015-11-05 | Qualcomm Incorporated | Sensory output for image association |
| US9223959B2 (en) * | 2013-11-08 | 2015-12-29 | Wipro Limited | Systems and methods for authentication based on user preferences |
| US9495525B2 (en) | 2014-04-10 | 2016-11-15 | Bank Of America Corporation | Rhythm-based user authentication |
| US20170102765A1 (en) * | 2015-10-08 | 2017-04-13 | Panasonic Intellectual Property Corporation Of America | Information presenting apparatus and control method therefor |
| US20170223017A1 (en) * | 2016-02-03 | 2017-08-03 | Mastercard International Incorporated | Interpreting user expression based on captured biometric data and providing services based thereon |
| US9953231B1 (en) * | 2015-11-17 | 2018-04-24 | United Services Automobile Association (Usaa) | Authentication based on heartbeat detection and facial recognition in video data |
-
2017
- 2017-10-25 US US15/792,961 patent/US10791111B2/en not_active Expired - Fee Related
- 2017-12-18 US US15/844,897 patent/US10798091B2/en active Active
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7873995B2 (en) | 2003-09-29 | 2011-01-18 | Avaya Inc. | Method and apparatus for generating and reinforcing user passwords |
| US8914642B2 (en) | 2006-03-29 | 2014-12-16 | The Bank Of Tokyo-Mitsubishi Ufj, Ltd. | Person oneself authenticating system and person oneself authenticating method |
| US8099770B2 (en) | 2008-01-30 | 2012-01-17 | Hewlett-Packard Development Company, L.P. | Apparatus, and an associated methodology, for facilitating authentication using a digital music authentication token |
| US9223959B2 (en) * | 2013-11-08 | 2015-12-29 | Wipro Limited | Systems and methods for authentication based on user preferences |
| US9495525B2 (en) | 2014-04-10 | 2016-11-15 | Bank Of America Corporation | Rhythm-based user authentication |
| US20150319153A1 (en) * | 2014-05-01 | 2015-11-05 | Qualcomm Incorporated | Sensory output for image association |
| US20170102765A1 (en) * | 2015-10-08 | 2017-04-13 | Panasonic Intellectual Property Corporation Of America | Information presenting apparatus and control method therefor |
| US9953231B1 (en) * | 2015-11-17 | 2018-04-24 | United Services Automobile Association (Usaa) | Authentication based on heartbeat detection and facial recognition in video data |
| US20170223017A1 (en) * | 2016-02-03 | 2017-08-03 | Mastercard International Incorporated | Interpreting user expression based on captured biometric data and providing services based thereon |
Also Published As
| Publication number | Publication date |
|---|---|
| US20190124068A1 (en) | 2019-04-25 |
| US20190124067A1 (en) | 2019-04-25 |
| US10798091B2 (en) | 2020-10-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10798091B2 (en) | Multi-step authentication using objective and subjective credentials | |
| US10615966B2 (en) | Selective content security using visual hashing | |
| US10673846B2 (en) | Pressure-based authentication | |
| US10970322B2 (en) | Training an artificial intelligence to generate an answer to a query based on an answer table pattern | |
| US11463467B2 (en) | Advanced risk evaluation for servers | |
| US9703982B2 (en) | Document distribution and interaction | |
| JP2006164237A (en) | User authentication by combination of speaker reference and reverse turing test | |
| US20170323111A1 (en) | Data management for a mass storage device | |
| KR101169801B1 (en) | Method and device for managing history of file | |
| US10681402B2 (en) | Providing relevant and authentic channel content to users based on user persona and interest | |
| US10452328B2 (en) | Extensible token-based authorization | |
| US20220292171A1 (en) | User authentication using original and modified images | |
| US11721116B2 (en) | Managing camera actions | |
| US11036839B2 (en) | Password authentication with input pattern analysis | |
| US20080172750A1 (en) | Self validation of user authentication requests | |
| US20210211868A1 (en) | Mobile device application software security | |
| US7155678B2 (en) | Method, system, and software for generating and displaying custom views for accessing multiple applications | |
| US11550896B2 (en) | Password strength | |
| US11301230B2 (en) | Machine learning multimedia conversion assignment | |
| US20230267145A1 (en) | Generating personalized digital thumbnails | |
| JP2023080027A (en) | Computer-implemented unstructured document processing method, computer program and system (analyzing duplicated data blocks associated with unstructured documents) | |
| WO2021223619A1 (en) | Message authentication using generative adversarial networks | |
| US11757865B2 (en) | Rule-based filtering for securing password login | |
| US20160364388A1 (en) | Selective exposure of document tags for search, access, and feed based on user groups | |
| CA3148242A1 (en) | System and method for codec for combining disparate content |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ANDERS, KELLEY;DUNNE, JONATHAN;GRANT, ROBERT;AND OTHERS;SIGNING DATES FROM 20171013 TO 20171016;REEL/FRAME:043943/0850 Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ANDERS, KELLEY;DUNNE, JONATHAN;GRANT, ROBERT;AND OTHERS;SIGNING DATES FROM 20171013 TO 20171016;REEL/FRAME:043943/0850 |
|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
| FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20240929 |